Sciweavers

2454 search results - page 364 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISW
2005
Springer
15 years 3 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
JSAI
2005
Springer
15 years 3 months ago
Detection of Assessment Patterns in Ordinary Triadic Conversation
Abstract.Abstract.Abstract. This article outlines a three-party conversation corpus built by the National Institute of Information and Communications Technology (Section 2) and int...
Katsuya Takanashi, Eiki Fujimoto, Yasuyuki Kono, K...
PCI
2005
Springer
15 years 3 months ago
Middleware for Building Ubiquitous Computing Applications Using Distributed Objects
Ubiquitous systems are characterized by multi-fold complexity, stemming mainly from the vast number of possible interactions between many heterogeneous objects and services. Device...
Nicolas Drossos, Eleni Christopoulou, Achilles Kam...
IMC
2004
ACM
15 years 3 months ago
The root of the matter: hints or slaves
We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
David Malone
ISCIS
2004
Springer
15 years 3 months ago
Modelling Role-Playing Games Using PEPA Nets
Abstract. We present a performance modelling case study of a distributed multi-player game expressed in the PEPA nets modelling language. The case study provides a modern complex d...
Stephen Gilmore, Leïla Kloul, Davide Piazza